A path traversal vulnerability exists in TMS Management Console (version 6.3.7.27386.20250818) from TMS Global Software. The "Download Template" function in the profile dashboard does not neutralize directory traversal sequences (../) in the filePath parameter, allowing authenticated users to read arbitrary files, such as the server's Web.config.
History

Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Tms
Tms management Console
Vendors & Products Tms
Tms management Console

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 22 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability exists in TMS Management Console (version 6.3.7.27386.20250818) from TMS Global Software. The "Download Template" function in the profile dashboard does not neutralize directory traversal sequences (../) in the filePath parameter, allowing authenticated users to read arbitrary files, such as the server's Web.config.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-01-22T00:00:00.000Z

Updated: 2026-01-22T17:10:30.454Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69612

cve-icon Vulnrichment

Updated: 2026-01-22T17:10:00.745Z

cve-icon NVD

Status : Received

Published: 2026-01-22T16:16:07.227

Modified: 2026-01-22T18:16:44.550

Link: CVE-2025-69612

cve-icon Redhat

No data.